Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
30-03-2022 06:16
Static task
static1
Behavioral task
behavioral1
Sample
s.exe
Resource
win7-20220311-en
General
-
Target
s.exe
-
Size
269KB
-
MD5
28c2680f129eac906328f1af39995787
-
SHA1
6d2c4c44c130c00a9813e88b5856fa7129d71bcf
-
SHA256
8425ae333ccb3d734a5f33136a2102d5bfde0e96fa438ca9aba8425cc17a1bf4
-
SHA512
4758a8df8d045bbacca51cfabb1d01cb1570d411f3872c5b2dc983effd30de4f3562bd41419b73f9e6f4146a982c89e3eec8d6f0412f4ad70677909a8d372a2b
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/SystemBC CnC Checkin
suricata: ET MALWARE Win32/SystemBC CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
usxm.exebhodkh.exelnhe.exepid process 4028 usxm.exe 2172 bhodkh.exe 4372 lnhe.exe -
Drops file in Windows directory 5 IoCs
Processes:
s.exeusxm.exebhodkh.exedescription ioc process File created C:\Windows\Tasks\usxm.job s.exe File opened for modification C:\Windows\Tasks\usxm.job s.exe File created C:\Windows\Tasks\ikiheesfpxmujrhrelb.job usxm.exe File created C:\Windows\Tasks\lnhe.job bhodkh.exe File opened for modification C:\Windows\Tasks\lnhe.job bhodkh.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2984 3316 WerFault.exe s.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
s.exebhodkh.exepid process 3316 s.exe 3316 s.exe 2172 bhodkh.exe 2172 bhodkh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\s.exe"C:\Users\Admin\AppData\Local\Temp\s.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 9522⤵
- Program crash
PID:2984
-
-
C:\ProgramData\iana\usxm.exeC:\ProgramData\iana\usxm.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3316 -ip 33161⤵PID:2408
-
C:\Windows\TEMP\bhodkh.exeC:\Windows\TEMP\bhodkh.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
C:\ProgramData\rbdg\lnhe.exeC:\ProgramData\rbdg\lnhe.exe start1⤵
- Executes dropped EXE
PID:4372
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD528c2680f129eac906328f1af39995787
SHA16d2c4c44c130c00a9813e88b5856fa7129d71bcf
SHA2568425ae333ccb3d734a5f33136a2102d5bfde0e96fa438ca9aba8425cc17a1bf4
SHA5124758a8df8d045bbacca51cfabb1d01cb1570d411f3872c5b2dc983effd30de4f3562bd41419b73f9e6f4146a982c89e3eec8d6f0412f4ad70677909a8d372a2b
-
Filesize
269KB
MD528c2680f129eac906328f1af39995787
SHA16d2c4c44c130c00a9813e88b5856fa7129d71bcf
SHA2568425ae333ccb3d734a5f33136a2102d5bfde0e96fa438ca9aba8425cc17a1bf4
SHA5124758a8df8d045bbacca51cfabb1d01cb1570d411f3872c5b2dc983effd30de4f3562bd41419b73f9e6f4146a982c89e3eec8d6f0412f4ad70677909a8d372a2b
-
Filesize
269KB
MD528c2680f129eac906328f1af39995787
SHA16d2c4c44c130c00a9813e88b5856fa7129d71bcf
SHA2568425ae333ccb3d734a5f33136a2102d5bfde0e96fa438ca9aba8425cc17a1bf4
SHA5124758a8df8d045bbacca51cfabb1d01cb1570d411f3872c5b2dc983effd30de4f3562bd41419b73f9e6f4146a982c89e3eec8d6f0412f4ad70677909a8d372a2b
-
Filesize
269KB
MD528c2680f129eac906328f1af39995787
SHA16d2c4c44c130c00a9813e88b5856fa7129d71bcf
SHA2568425ae333ccb3d734a5f33136a2102d5bfde0e96fa438ca9aba8425cc17a1bf4
SHA5124758a8df8d045bbacca51cfabb1d01cb1570d411f3872c5b2dc983effd30de4f3562bd41419b73f9e6f4146a982c89e3eec8d6f0412f4ad70677909a8d372a2b
-
Filesize
269KB
MD528c2680f129eac906328f1af39995787
SHA16d2c4c44c130c00a9813e88b5856fa7129d71bcf
SHA2568425ae333ccb3d734a5f33136a2102d5bfde0e96fa438ca9aba8425cc17a1bf4
SHA5124758a8df8d045bbacca51cfabb1d01cb1570d411f3872c5b2dc983effd30de4f3562bd41419b73f9e6f4146a982c89e3eec8d6f0412f4ad70677909a8d372a2b
-
Filesize
242B
MD52b01c41b3d4bb7a7914037923292eeb5
SHA1a3c5e168b57cd2070c7eaf49cd865da77a6c3053
SHA256a37bc99caabb7b0f267b71512b6aead8dbfe567f4bb73987045e1b3a6998fdf4
SHA51288be86f09d0e1457d7af74cb0d218f5595817aa6d79d6fdf04f54f748fab52b5737ee3d80ad08b9f6abf6cf084d5221b806c7c74e4fda3f193293c22a00abcda
-
Filesize
269KB
MD528c2680f129eac906328f1af39995787
SHA16d2c4c44c130c00a9813e88b5856fa7129d71bcf
SHA2568425ae333ccb3d734a5f33136a2102d5bfde0e96fa438ca9aba8425cc17a1bf4
SHA5124758a8df8d045bbacca51cfabb1d01cb1570d411f3872c5b2dc983effd30de4f3562bd41419b73f9e6f4146a982c89e3eec8d6f0412f4ad70677909a8d372a2b